CVE-2013-6381Improper Restriction of Operations within the Bounds of a Memory Buffer in Kernel

Severity
6.9MEDIUMNVD
EPSS
0.1%
top 73.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 27
Latest updateJun 11

Description

Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.

CVSS vector

AV:L/AC:M/C:C/I:C/A:CExploitability: 3.4 | Impact: 10.0

Affected Packages7 packages

NVDlinux/linux_kernel3.33.4.72+3
Debianlinux/linux_kernel< 3.11.10-1+3
debiandebian/linux< linux 3.11.10-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-f88x-mj9c-xm2g: Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main2022-05-17
OSV
CVE-2013-6381: Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main2013-11-27

📋Vendor Advisories

3
Microsoft
CVE-2013-6381: NIST NVD Details: https://nvd2024-06-11
Red Hat
Kernel: qeth: buffer overflow in snmp ioctl2013-11-22
Debian
CVE-2013-6381: linux - Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_...2013

💬Community

1
Bugzilla
CVE-2013-6381 Kernel: qeth: buffer overflow in snmp ioctl2013-11-22